570 likes | 650 Views
Depression Era Tactics for IT Are you Tough Enough?. IT and the Auditor – The Sequel. Introduction. What is IT? What is audit? What you will learn Let’s Introduce ourselves. Agenda. Introduction IT Management Overview Audit Management Overview What do we have in common? Strategies
E N D
Depression Era Tactics for ITAre you Tough Enough? IT and the Auditor – The Sequel
Introduction • What is IT? • What is audit? • What you will learn • Let’s Introduce ourselves GA GMIS Spring 2009 Conference
Agenda • Introduction • IT Management Overview • Audit Management Overview • What do we have in common? • Strategies • Closing GA GMIS Spring 2009 Conference
Overview • IT • Auditors defined • Relationship • Risk as a common ground • KPI • Results GA GMIS Spring 2009 Conference
Vocabulary • Accountability • The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action. • Assurance • Grounds for confidence that the other four security goals (integrity, availability, confidentiality, and accountability) have been adequately met by a specific implementation. “Adequately met” includes (1) functionality that performs correctly, (2) sufficient protection against unintentional errors (by users or software), and (3) sufficient resistance to intentional penetration or bypass. • Availability • The security goal that generates the requirement for protection against— Intentional or accidental attempts to (1) perform unauthorized deletion of data or (2) otherwise cause a denial of service or data Unauthorized use of system resources. • Confidentiality • The security goal that generates the requirement for protection from intentional or accidental attempts to perform unauthorized data reads. Confidentiality covers data in storage, during processing, and in transit. • Denial of Service • The prevention of authorized access to resources or the delaying of time critical The prevention of authorized access to resources or the delaying of time critical operations. • Due Care • Managers and their organizations have a duty to provide for information security to ensure that the type of control, the cost of control, and the deployment of control are appropriate for the system being managed. • Integrity • The security goal that generates the requirement for protection against either intentional or accidental attempts to violate data integrity (the property that data has when it has not been altered in an unauthorized manner) or system integrity (the quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation). GA GMIS Spring 2009 Conference
Vocabulary Continued • Risk • Within this presentation, synonymous with IT-Related Risk. • Risk Assessment • The process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and additional safeguards that would mitigate this impact. Part of Risk Management and synonymous with Risk Analysis. • Risk Management • The total process of identifying, controlling, and mitigating information system–related risks. It includes risk assessment; cost-benefit analysis; and the selection, implementation, test, and security evaluation of safeguards. This overall system security review considers both effectiveness and efficiency, including impact on the mission and constraints due to policy, regulations, and laws. • Security • Information system security is a system characteristic and a set of mechanisms that span the system both logically and physically. • Security Goals • The five security goals are integrity, availability, confidentiality, accountability, and assurance. • Threat • The potential for a threat source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability. • Threat-source • Either (1) intent and method targeted at the intentional exploitation of a vulnerability or (2) a situation and method that may accidentally trigger a vulnerability. • Threat Analysis • The examination of threat-sources against system vulnerabilities to determine the threats for a particular system in a particular operational environment. • Vulnerability • A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system’s security policy. GA GMIS Spring 2009 Conference
Vocabulary Continued • IT Related Risk • The net mission impact considering (1) the probability that a particular threat-source will exercise (accidentally trigger or intentionally exploit) a particular information system vulnerability and (2) the resulting impact if this should occur. IT-related risks arise from legal liability or mission loss due to— • 1. Unauthorized (malicious or accidental) disclosure, modification, or destruction of information • 2. Unintentional errors and omissions • 3. IT disruptions due to natural or man-made disasters • 4. Failure to exercise due care and diligence in the implementation and operation of the IT system. GA GMIS Spring 2009 Conference
IT Defined GA GMIS Spring 2009 Conference
Audit Supports GA GMIS Spring 2009 Conference
Auditor and IT – Converging! GA GMIS Spring 2009 Conference
Qualities of a good auditor! GA GMIS Spring 2009 Conference
Compare the qualities of an Auditor to a CIO • Auditor vs CIO GA GMIS Spring 2009 Conference
Compare Internal and External Auditor • Internal Auditor versus External Auditor GA GMIS Spring 2009 Conference
Establishing and maintaining a positive relationship with Auditor! • It starts with the request for information • This should be your opportunity to highlight your well run IT organization • Provide them all the information they need and get them out the door or back in another department • Type of Audit/Auditor • Internal • External (Annual) • Federal • Was it planned or provoked? GA GMIS Spring 2009 Conference
Auditor’s Request for IT information • Document1 18 pages • 200 elements requiring a response • Range of questions • Risk assessment and monitoring • Program Development and Implementation • Analysis and Design – Testing and QA • Data Conversion –Go Live • Documentation and Training • Change Management – Security Policy • Security (Apps, Network, Physical) • Business Continuity GA GMIS Spring 2009 Conference
IT Budget and the auditor • The auditor could provide the support you need for additional resources • Answer questions honestly and completely GA GMIS Spring 2009 Conference
Auditor’s Hot buttons – concept of least privileges! GA GMIS Spring 2009 Conference
IT Charter/Project Charter GA GMIS Spring 2009 Conference
Application Environments GA GMIS Spring 2009 Conference
What is an Auditable IT Org? GA GMIS Spring 2009 Conference
A Great IT Org! GA GMIS Spring 2009 Conference
Security Concern GA GMIS Spring 2009 Conference
IT Steering Team • Secure membership for the Auditor • If the Organization does not have an internal auditor – a qualified member of the organization should fulfill this role on the Team • Lean on the Auditor for help in setting the standards for RISK ANALYSIS • Maintain formal documentation in all meetings • Share written minutes with all members of the team GA GMIS Spring 2009 Conference
Definition of Uncertainty and Risk • What is risk? GA GMIS Spring 2009 Conference
Definition of Uncertainty and Risk • What is risk? • It is really the measurement of uncertainty. GA GMIS Spring 2009 Conference
Definition of Uncertainty and Risk • What is uncertainty? • It is the lack of sureness about an outcome, ranging from just short of certainty to almost complete lack of knowledge about and outcome. GA GMIS Spring 2009 Conference
Aspects of Risk • Risk event • Risk as an opportunity • Risk as a threat GA GMIS Spring 2009 Conference
What is your manager’s tolerance for Risk? GA GMIS Spring 2009 Conference
Issues or Risks? GA GMIS Spring 2009 Conference
What is your manager’s tolerance for Risk? GA GMIS Spring 2009 Conference
General Risk Management Strategy GA GMIS Spring 2009 Conference
Risk Mitigation • Residual Risk Reduce Number of flaws or errors Residual Risk Add a targeted control New or Enhanced Controls Reduce Magnitude of Impact GA GMIS Spring 2009 Conference
Risk Management • Importance of Risk Management • Integration of Risk Management into the SDLC • Key Roles • Risk Ownership GA GMIS Spring 2009 Conference
Risk Management • Importance of Risk Management • Risk management plays a critical role in protecting an organization’s information assets, and therefore its mission, from IT-related risk. • An effective risk management process is an important component of a successful IT security program. • The principal goal of an organization’s risk management process should be to protect the organization and its ability to perform their mission, not just its IT assets. • Therefore, the risk management process should not be treated primarily as a technical function carried out by the IT experts who operate and manage the IT system, but as an essential management function of the organization. GA GMIS Spring 2009 Conference
Risk Management • Integration of Risk Management into the SDLC GA GMIS Spring 2009 Conference
Risk Management • Integration of Risk Management into the SDLC GA GMIS Spring 2009 Conference
Risk Management • Key Roles • Senior Management • Chief Information Officer (CIO) • Systems and Information Owners • Business and Functional Managers • Internal auditor • IT Security Practitioners GA GMIS Spring 2009 Conference
Risk Assessment • System Characterization • Threat Identification • Vulnerability Identification • Control Analysis • Likelihood Determination • Impact Analysis • Risk Determination • Control Recommendations • Results Documentation GA GMIS Spring 2009 Conference
Risk Assessment Activities • System Characterization GA GMIS Spring 2009 Conference
Risk Assessment Activities • System Characterization • Establish the Scope of effort • Define the authorization boundaries • Provide the information essential to risk definition (input) GA GMIS Spring 2009 Conference
Information Gathering GA GMIS Spring 2009 Conference
Risk Assessment Activities • System Characterization • System related information • Input • Additional input • IT Systems Functional requirements • System Knowledge workers • Current Security policy • System security architecture • Network Topology – diagrams • Information storage info • Information flow • Controls (technical, management and operational) • Physical and Environmental security) GA GMIS Spring 2009 Conference
Risk Assessment Activities • Human Threats: Threat-Source, Motivation, and Threat ActionsThreat-Source Motivation Threat Actions GA GMIS Spring 2009 Conference
Risk Assessment Activities • Human Threats: Threat-Source, Motivation, and Threat Actions Threat-Source Motivation Threat Actions - Cont GA GMIS Spring 2009 Conference
Risk Assessment Activities • Vulnerability Identification • Vulnerability/Threat GA GMIS Spring 2009 Conference
Risk Assessment Activities • Vulnerability Identification • Development of Security Requirements Checklist (Security Criteria) GA GMIS Spring 2009 Conference
Risk Assessment Activities • Vulnerability Identification • Development of Security Requirements Checklist (Security Criteria) GA GMIS Spring 2009 Conference
Risk Assessment Activities • Vulnerability Identification • Development of Security Requirements Checklist (Security Criteria) GA GMIS Spring 2009 Conference
Risk Mitigation • Risk Mitigation Options • Risk Mitigation Strategies • Approach for Control Implementation • Control Categories • Cost-Benefit Analysis • Residual Risk GA GMIS Spring 2009 Conference
Risk Mitigation • Residual Risk Reduce Number of flaws or errors Residual Risk Add a targeted control New or Enhanced Controls Reduce Magnitude of Impact GA GMIS Spring 2009 Conference